NCO- Cyber Olympiad (SOF) Class 12: Questions 107 - 111 of 520

Access detailed explanations (illustrated with images and videos) to 520 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 350.00 or

How to register?

Question number: 107

» Computer » Network Security Concepts

Edit
MCQ▾

Question

Identify the type of packet transmission on the given network. Where Router, Source and Destination. In this, a packet starts from source S1 and passes through routers to reach the destination D1.

Diagram shows the type of packet transmission on the network

Diagram Shows the Type of Packet Transmission on the Network

This diagram shows the type of packet transmission on the network

Image title: Diagram shows the type of packet transmission on the network

Image description: This diagram shows the type of packet transmission on the network

Choices

Choice (4) Response

a.

Dual cast

b.

Multicast

c.

Broadcast

d.

Unicast

Question number: 108

» Computer » Programming in C++

Edit
MCQ▾

Question

What is the output of this Program?

  1. #include<iostream.h>
  2. using namespace std;
  3. int main()
  4. {
  5.     int a;
  6.     a = 5 + 3*5;
  7.     cout<<a;
  8.     return 0;
  9. }

Choices

Choice (4) Response

a.

25

b.

20

c.

35

d.

30

Question number: 109

» Computer » SQL

Edit
MCQ▾

Question

In SQL, ________ is a table that does not really exist in its own right but is instead derived from one or more underlying base tables.

Choices

Choice (4) Response

a.

View

b.

Select

c.

Cardinal

d.

Candidate

Question number: 110

» Computer » HTML

Edit
MCQ▾

Question

Which of the following HTML tag is used to create a hyperlink?

Choices

Choice (4) Response

a.

< href >

b.

< link >

c.

< a >

d.

< p >

Question number: 111

» Computer » Database Concepts

Edit
MCQ▾

Question

Updates that Violate ________ are Disallowed.

Choices

Choice (4) Response

a.

Authorization

b.

DDL constraints

c.

Transaction control

d.

Integrity constraints